Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover image
Title page
Table of Contents
Copyright
To the Reader
Preface. What Is This?
What Is Cryptography?
What Can Cryptography Do?
Basic Cryptographic Functions
Does “Secret” Mean the Same as “Private”?
What OS Should I Use?
How Do I Do All This Stuff?
Introduction
Chapter 1. Using Gnu Privacy Guard
1.1 Keeping Data Secret, for a Novice GnuPG User
1.2 The Simplest Example: GnuPG Symmetric Encrypting Text
1.3 Decrypting a File (Symmetric Key)
1.4 Encrypting Interactively
1.5 ASCII Armor
1.6 Command Summary and Review
1.7 Review Questions
Chapter 2. Selected FAQs on Using GnuPG
2.1 Why Use GnuPG
2.2 Why Start with the Command Line
2.3 Why Use the Command Line
2.4 Getting to the Command Line
2.5 Is GnuPG Even Installed?
2.6 GnuPG Commands and Options
2.7 Simple Examples
2.8 Options: Getting More Information
2.9 Options: Text or Binary
2.10 Command Summary and Review
2.11 Review Questions
Chapter 3. Public Keys
3.1 Getting Someone’s Public Key
3.2 Generating a Public Key
3.3 Why Two Key Pairs?
3.4 Key Length
3.5 Key Expiration and Key Revocation
3.6 Reasons for Key Revocation
3.7 Generating a Public Key Pair, Completed
3.8 Exporting a Public Key
3.9 Command Summary and Review
3.10 Review Questions
Chapter 4. Public Key Functions
4.1 Decrypting and Verifying
4.2 Web of Trust
4.3 Encrypt and Sign
4.4 Benefits of Digital Signatures
4.5 Command Summary and Review
4.6 Review Questions
Chapter 5. More About Signatures
5.1 “Decrypting” a Digital Signature
5.2 More About Signatures
5.3 Digital Signature Types
5.4 Signing and Verifying, Summarized
5.5 Review Questions
Chapter 6. Working with Public Keys
6.1 Trusting a Public Key
6.2 Using Keyservers
6.3 Review Questions
Chapter 7. Editing and Revoking a Public Key
7.1 Editing Keys
7.2 Revoking a Key
7.3 Command Summary and Review
7.4 Review Questions
Chapter 8. Security Practices and Tips
8.1 Verifying Software Downloads
8.2 Passphrases: Doing Them Right
8.3 Dangers of RAM Cache and Other System Artifacts
8.4 Full Disk Encryption
8.5 Encrypting Your System Hard Drive FAQ
Postscript
← Prev
Back
Next →
← Prev
Back
Next →